Supervision

The purpose of Wireshark is to capture network traffic in a form humans can read. This is why we decided to test it on our Windows 7 computer and look at how the program handles our network traffic.
Wireshark has a very simple layout that is easy to use and enables you to get started almost immediately. You just have to launch the program, choose what ‘packet’ to capture and then you can access all the protocols it contains. The packet displays real time…

GFI LANguard Security Event Log Monitor archives and analyses the event logs of all network machines and alerts you in real time to security issues, attacks and other critical events. GFI LANguard S. E. L. M.'s intelligent analysis means you do not need to be an 'Event Guru' to be able to: Monitor users attempting to access secured shares and confidential files

SystemSleuth enables you monitor and record all the following activity: Emails, chat activity (ICQ, MSN, AOL and more), video recording, every single keystroke, visited websites, software used on the computer, printer activity and much more. This great program is very easy to use and simple to get familiar with, and best of all it is completely invisible to everyone except you.

Power Spy allow you to secretly monitor and record all activities on your computer. Such monitoring acts so stealthily that the user won't know its existence. Possible usages of Power Spy includes: monitors employees, children, spouse, acquire others' passwords, chat records, websites visited and investigate crimes. While Power Spy is the perfect tool for catching a cheating spouse, it is also perfect for long-term child monitoring.

NETObserve runs discretely in the background and monitors chats, web-sites visited, used programs, copy/paste, documents printed, and much more. NETObserve can be set to taking screenshots of the activity on the computer and even activate webcam and start recording. All this can be seen online from another computer via a normal browser, or exported to HTML, Excel, plain text, or CSV.

We tested System Information Viewer on our Windows 7 computer where we tried some of the various monitoring options to get a closer look at what this program has to offer and how this can improve your computer experience.
The main purpose of SIV is to monitor your network, system and hardware and you will get all the data you need. This is almost guaranteed as the program displays almost every kind of information you could even think of. This brings us to the design…

A keylogger is a program that records all the entries you make on your computer. It’s a kind of virus program that sends a message to a hacker, who can monitor your passwords and then log in to all the accounts you have. With KeyScrambler you can encrypt everything you write so keyloggers can’t monitor your entries. KeyScrambler is a free application for your browser that protects everything you type from keyloggers. The program prevents keyloggers by en…

If a new application is trying to get access to the internet through your computer, Glasswire can check if it’s a legit application or a hoax. Glasswire keeps an eye open on your network activity and makes sure you are aware what’s happening. This is a great way to keep virus off bay.
You get a great overview visually with a graph that is updating around the clock.
Make sure you’re always updated with what’s happening in your network with Gla…

Home Keylogger is a piece of spy software that intercepts all keyboard input and writes it to a log file. This free program works in stealth mode and is next to impossible to detect. Only the person who knows a special key combination can control Home Keylogger. Home Keylogger presents the logged data in a neat way that is easy to read, but at the same time it fixes every event that has been done. Every keystroke is written to the log file with the title of the wind…

Every part of the computer is being supervised by Motherboard Monitor and if an electronic part becomes to warm, the program will automatically alert you, so that your hardware isn't damaged. This is a great feature to have, especially if you're over-clocking your hardware or have built your computer yourself.
Also the developer no longer updates this software.
This software only supports this type of chips: LM75, LM78, LM78-j, LM79, LM80, WinBond W83781D, WinBond W…

Advanced Keylogger is very efficient at concealing itself and providing the administrator with reports to his email address. All relevant activity on the targeted computer can be logged: login, codes, copy/paste, and much more. An excellent tool for parents or employers.

When the program is installed it makes sure that file-sharing via the local network comply with the rules defined for it. It makes sure that groups of people e. g. in a company only have access to the shared files they actually have permission to use.

Thereby this software can be used as a powerful multi tool the not only monitors your system but also lets you debug software and find malware on your computer.
Process Hacker has a simple interface, which lists all the processes and services that are active in Windows at a given time. You can view a complete information about a specific process e. g. SVCHOST or Internet Explorer - you can see how much memory and resources the different processes use in Windows. Ar…

We tested SpeedFan on our Windows 7 computer where it monitored the computer while we worked. The program monitors all hardware parts that have a monitor-chip installed and it gives you readings about CPU usage, fan speed, temperature, voltage and more.
SpeedFan also gives you the opportunity to create charts and compare the data with previous readings to get an overview of your computer overall performance. Some of the more advanced features of this program are the…

ContaCam is a live webcam and video surveillance software that uses very few system resources.
It is a fast and light program that is simple and user-friendly. It meets all your security needs and it is still able to run on very moderate systems.
When you set up the software, you can choose the type of monitor you want to use it for. Here you can also determine how many thumbnails you want to see at the same time, how long it will be monitored and how often.
When ch…